Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0068142 PROTECTION BARRIER AND LASER IRRADIATION SYSTEM
A protection barrier including openings through which an irradiation target passes through the protection barrier, wherein the protection barrier is configured...
2018/0068141 Verfahren und Interaktion zwischen einem Datenverarbeitungsgerat und einem mobilen Gerat sowie Anordnung zur...
A method and arrangement for interaction between a data processing device and a mobile device for the activation of a software action in the data processing...
2018/0068140 MANAGEMENT SYSTEM, MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND MANAGEMENT PROGRAM
A management system includes: a reader that reads item information related to a target item from the target item; an identifier that identifies an authorized...
2018/0068139 BUNDLED UNIT IDENTIFICATION AND TRACKING
A unique digital identifier of a bundled set of items may be generated based on imaging data or other information captured from the bundled set, stored, and...
2018/0068138 CARD READER AND METHOD OF USE THEREOF
A representative card reader that communicates with a host device comprises an EMV chip interfacing circuit that facilitates transmitting and receiving data to...
2018/0068137 SHAPE ACTUATION ENCAPSULANT OF A CRYPTOGRAPHIC MODULE
To provide for a physical security mechanism that forms a complete envelope of protection around the cryptographic module to detect and respond to an...
2018/0068136 Systems and Methods for Detecting and Mitigating of Programmable Logic Device Tampering
Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have...
2018/0068135 DETECTION OF THE OPENING OF A DATA INPUT DEVICE
A security element for a data input device. The security element has a shape suited to closing contacts via each of its two extremities respectively on two...
2018/0068134 METHOD TO ISOLATE REAL-TIME OR SAFETY-CRITICAL SOFTWARE AND OPERATING SYSTEM FROM NON-CRITICAL SOFTWARE AND...
A method is provided to isolate a secure operation region with a safety-critical software and real-time operating system from a non-secure operation region...
2018/0068133 METHOD AND DEVICE HAVING SECURE REMOVABLE MODULES
A method at an electronic device having at least one slot to receive a removable security module, the method including detecting coupling of the security...
2018/0068132 Method for Integrating Applications
In certain embodiments, a method includes mapping, by a first application, personally identifiable information to an anonymous identification, generating, by...
2018/0068131 Viewing Session Takeover in Medical Imaging Applications
A system for viewing session takeover is provided. A plurality of user accounts have access to patient medical data images. A locking mechanism is operable by...
2018/0068130 SYSTEM AND METHOD FOR MAINTAINING A SEGREGATED DATABASE IN A MULTIPLE DISTRIBUTED LEDGER SYSTEM
An apparatus maintains a segregated database in a multiple distributed ledger system. The apparatus includes a storage device that stores software instructions...
2018/0068129 IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION COMMAND FLOW PROCESSING IN CAPI ADAPTERS
A method, system and computer program product are provided for implementing block extent granularity authorization command flow processing for a Coherent...
2018/0068128 IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION PROCESSING IN CAPI ADAPTERS
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
2018/0068127 NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, AND INFORMATION PROCESSING DEVICE
A non-transitory computer-readable storage medium storing a control program that causes a computer to execute a process including receiving specified...
2018/0068126 PRIVACY MANAGEMENT
According to an example aspect of the present invention, there is provided an apparatus comprising a memory interface configured to access a plurality of...
2018/0068125 SECURE CLOUD STORAGE DISTRIBUTION AND AGGREGATION
Methods and systems for secure cloud storage are provided. According to one embodiment, file storage policies are maintained for users of an enterprise network...
2018/0068124 SYSTEMS AND METHODS FOR DETECTING SENSITIVE INFORMATION LEAKAGE WHILE PRESERVING PRIVACY
Systems and methods for privacy-preserving data loss detection include performing a sweep of online information for a candidate data leakage to generate an...
2018/0068123 PRIVATE DOMAIN NAME REGISTRATION
A service for protecting the privacy of domain name registrants while preserving the registrant's ability to directly change the registration information or...
2018/0068122 TRANSMISSION OF TRUSTWORTHY DATA
A method and system for transmitting trustworthy data. Changes to content of a raw data file (F.sub.0) of raw data are determined wherein F.sub.0 is a version...
2018/0068121 AUTOMATED REVERSE ENGINEERING
A Taint Modeling Function (TMF) finds abstract patterns and uses them to automate the malware detection process. TMF involves the process of statically...
2018/0068120 RECORDING MEDIUM FOR STORING PROGRAM FOR MALWARE DETECTION, AND APPARATUS AND METHOD FOR MALWARE DETECTION
A method for malware detection includes: executing transmission processing that includes adding information pertaining to a specific file to a file list...
2018/0068119 ENHANCED INTELLIGENCE FOR A SECURITY INFORMATION SHARING PLATFORM
Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform. Some examples may enable correlating a...
2018/0068118 METHOD AND SYSTEM FOR PREVENTING AND DETECTING SECURITY THREATS
A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the...
2018/0068117 METHOD AND SYSTEM FOR PREVENTING AND DETECTING SECURITY THREATS
A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the...
2018/0068116 SECURING EXECUTION OF A PROGRAM
In a general aspect, a method can include: executing an operation of a program that loads an arbitrarily chosen value of an initial data item of a series of...
2018/0068115 SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILES
Disclosed are system and method for detecting malicious code in files. One exemplary method comprises: intercepting, by a processor, one or more application...
2018/0068114 AUTOMATED SCRIPT
A device may require one or more updates to its software. However, the device may be inaccessible due to a variety of circumstances. Troubleshooting the device...
2018/0068113 IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION PROCESSING IN CAPI ADAPTERS
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator...
2018/0068112 Event-Based User State Synchronization in a Local Cloud of a Cloud Storage System
Cloud storage systems and methods are described for providing event-based user state synchronization among the various cloud elements. A global user directory...
2018/0068111 METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person...
2018/0068110 INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND...
An information processing apparatus includes a storage unit configured to store therein address book information in which at least tag identification...
2018/0068109 Extension Configuration and Interaction
Techniques for extension interaction with applications are described. Generally, an extension represents functionality for extending, modifying, customizing,...
2018/0068108 A MOBILE DEVICE AND SYSTEMS TO SECURELY REMOTELY ACCESS, MANAGE AND STORE AN ENTERPRISE'S DATA, USING EMPLOYEES...
A mobile device, a method and system are providing the invention mobile Bring Your Own Device (BYOD) enhanced security management platform solution. The...
2018/0068107 MANAGEMENT DEVICE, VEHICLE, MANAGEMENT METHOD, AND COMPUTER PROGRAM
A management device installed in an automobile includes an initially-delivered key storage unit for storing a plurality of initially-delivered keys...
2018/0068106 MANAGING LATENCY AND POWER IN A HETEROGENEOUS DISTRIBUTED BIOMETRIC AUTHENTICATION HARDWARE
Techniques for authenticating a biometric input are disclosed. An example of a biometric authentication system is configured to receive a biometric input,...
2018/0068105 SYSTEM AND METHOD FOR SUPPLYING SECURITY INFORMATION
A wearable device having one or more processors configured to receive one or more signals representative of biometric parameter(s) and sensed presence of a...
2018/0068104 SLEEP DATA CHAIN OF CUSTODY
A wearable device includes one or more biometric sensors, each of the one or more biometric sensors gathering biological data from a wearer of the wearable...
2018/0068103 Audiovisual associative authentication method, related system and device
Electronic system (106, 109A) for authenticating a user of an electronic service, said system preferably comprising at least one server apparatus, the system...
2018/0068102 User authentication using prompted text
Methods, computing systems and computer program products implement embodiments of the present invention that include defining a verification string including a...
2018/0068101 ACCESSING A USER EQUIPMENT USING A BIOMETRIC SENSOR CONCURRENTLY WITH AN AUTHENTICATION PATTERN
The present application relates to authenticating a user of a user equipment (UE). Specifically, the described aspects include presenting for display an...
2018/0068100 THREE-DIMENSIONAL FINGERPRINT SCANNER
A fingerprint scanner includes a fingerprint scanner plate, a rotating platform aligned below the fingerprint scanner plate, a light mounted on the rotating...
2018/0068099 DETERMINE SECURITY ACCESS LEVEL BASED ON USER BEHAVIOR
Examples of techniques for determining security access based on user behavioral measurements are disclosed. In accordance with aspects of the present...
2018/0068098 Continuous User Authentication
A method of enabling continuous user authentication, comprising: setting up an authentication server to provide authentication data to an enterprise server in...
2018/0068097 SYSTEMS AND METHODS FOR PROVIDING IDENTITY ASSURANCE FOR DECENTRALIZED APPLICATIONS
An embodiment of a method of providing identity assurance for a decentralized application (DApp) includes executing, by at least one distributed node of a...
2018/0068096 USAGE PARAMETERS FOR COMMUNICATION CONTENT
In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings,...
2018/0068095 PROCESSING EQUIPMENT AND REMOTE MANAGEMENT SYSTEM
A processing equipment includes a processing unit having a plurality of functions. A retaining unit retains a device identifier capable of identifying the...
2018/0068094 Physical Confirmation for Network-Provided Content
A computer-implemented method includes receiving, from a remote communication device and at a server system, information that indicates a unique identifier for...
2018/0068093 FILE ORIGIN DETERMINATION
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.